Bits Substitution to Secure LSB Method of Data Steganography
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.11, No. 8)Publication Date: 2022-08-30
Authors : Ziad Alqadi;
Page : 9-21
Keywords : Steganography; covering image; stego image; secret message; PK; substitution; MSE; PSNR;
Abstract
Least significant bit of data hiding is one of the most popular used methods in data steganography, this method is simple and efficient, but it is not secure. In this research paper a modified LSB method version will be proposed, this version added a private key as an input of data hiding and data extracting. The private key will contain 8 components which provide a necessary key space to protect the hidden message. The PK key will be used to perform the required substitution and arrangement of the binary version of the secret message. The proposed method will be tested for quality and performance to prove that the proposed method keeps the performance of the LSB method without changes. Several images will be used as a covering images and a recommendation will be suggested to keep the method efficient.
Other Latest Articles
- Comparative Analysis of Various Software Development Life Cycle
- Barangay Integrated Management System with Mobile Support
- HYPERTROPHY OF THE CLITORIS IN AN ADULT WOMAN (CASE REPORT)
- EFFECT OF LDPE/CR ADMIXTURE ON THE PROPERTIES OF BITUMINOUS BINDER USED IN PAVING APPLICATIONS
- EFFECT OF DEXAMETHASONE AS AN ADJUVANT TO BUPIVACAINE IN ULTRASOUND GUIDED INTERSCALENE BRACHIAL PLEXUS BLOCK IN UPPER ARM SURGERIES
Last modified: 2022-08-11 01:00:55